US6199049B1 - Verifiable electronic journal for a point of sale device and methods for using the same - Google Patents

Verifiable electronic journal for a point of sale device and methods for using the same Download PDF

Info

Publication number
US6199049B1
US6199049B1 US09/164,215 US16421598A US6199049B1 US 6199049 B1 US6199049 B1 US 6199049B1 US 16421598 A US16421598 A US 16421598A US 6199049 B1 US6199049 B1 US 6199049B1
Authority
US
United States
Prior art keywords
journal
transaction information
memory
data signature
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US09/164,215
Inventor
Alberto Gustavo Gonzalez Conde
Robert Scott Fortenberry
Wayne Roger Hucaby
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Global Commerce Solutions Holdings Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Assigned to IBM CORPORATION reassignment IBM CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CONDE, ALBERTO GUSTAVO GONZALEZ, FORTENBERRY, ROBERT SCOTT, HUCABY, WAYNE ROGER
Priority to US09/164,215 priority Critical patent/US6199049B1/en
Priority to DE69913365T priority patent/DE69913365T2/en
Priority to AU61009/99A priority patent/AU6100999A/en
Priority to PL99346943A priority patent/PL346943A1/en
Priority to AT99947623T priority patent/ATE255756T1/en
Priority to HU0103629A priority patent/HUP0103629A3/en
Priority to EP99947623A priority patent/EP1118066B1/en
Priority to PCT/GB1999/003105 priority patent/WO2000019387A1/en
Priority to CN99811522A priority patent/CN1320253A/en
Priority to TW088116514A priority patent/TW446898B/en
Publication of US6199049B1 publication Critical patent/US6199049B1/en
Application granted granted Critical
Assigned to TOSHIBA GLOBAL COMMERCE SOLUTIONS HOLDINGS CORPORATION reassignment TOSHIBA GLOBAL COMMERCE SOLUTIONS HOLDINGS CORPORATION PATENT ASSIGNMENT AND RESERVATION Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G5/00Receipt-giving machines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/209Specified transaction journal output feature, e.g. printed receipt or voice output
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated

Definitions

  • the present invention relates to point of sale systems in general and in particular to journals for such transaction based devices.
  • the present invention further relates to methods for using point of sale systems.
  • Such a point of sale system may include a scanner for reading coded product information, a terminal for manual entry of transaction information and storage of currency, a display for displaying transaction information and a printer which may be used to produce a documentary record or journal for the business and a printed receipt for the customer.
  • the sales price of each item purchased is typically entered into the point of sale terminal.
  • Each item price and a total is printed by the point of sale printer on a customer receipt and may also be printed on a separate journal by the same point of sale printer.
  • a tax due is commonly also determined and printed on the customer receipt.
  • the customer receipt is then provided from the printer to the customer.
  • the second printer station maintains a journal record of all sales transactions.
  • This provides a written record for auditing sales activity such as gross sales amounts and taxes collected during a journal period covered by the journal record.
  • This information could be used, for example, by a taxing authority to determine if a retailer has submitted payment to the taxing authority of all taxes collected from customers.
  • governmental authorities acquire an interest in retail journal information, such as through value added tax laws or sales tax laws, the respective tax laws frequently define the format and content of printed receipts and mandate secure methods of sales data capture. It is known to respond to such “fiscal” requirements by providing a fiscal printer such as the 3 F printer from International Business Machines, Inc. of Armonk, N.Y. With such a fiscal printer, a secure (i.e., tamper-evident or resistant enclosure) logic card with dedicated nonvolatile random access memory (NVRAM) and electronically programmable read only memory (EPROM) may be placed both physically and logically between a point of sale terminal and a point of sale printer which generates customer receipts and journal records.
  • NVRAM nonvolatile random access memory
  • EPROM electronically programmable read only memory
  • the point of sale terminal may be connected to a fiscal base device which is secured to the point of sale printer and which controls all printing functions by a communications link such as a serial communications link.
  • a communications link such as a serial communications link.
  • Point of sale terminal 10 is connected to fiscal base 24 over communications link 22 .
  • Fiscal printer 20 in turn includes both fiscal base 24 and two station printer 26 .
  • Fiscal base 24 includes a fiscal processor 28 or other control means for controlling journal and printing operations.
  • Fiscal base 24 further includes a battery backed (nonvolatile) random access memory 30 to store intermediate sales and tax totals during a journal period.
  • fiscal base 24 further includes a separate program EPROM 32 and fiscal memory EPROM 34 .
  • a separate fiscal memory EPROM 34 is provided, encased in epoxy, for permanent storage of data, which typically includes daily sales and tax totals for some number of daily journal periods depending upon the capacity of fiscal memory EPROM 34 .
  • Program EPROM 32 may then be used for program information or data values used by fiscal processor 28 .
  • a time of day clock 36 which may be used for tracking transactions and journal periods.
  • Two station printer 26 is controlled by fiscal processor 28 .
  • a first printing station provides a customer receipt station whose printing is controlled by fiscal processor 28 to assure that the sales receipt provided to the customer has the correct data on it related to a particular transaction.
  • the second station provides a journal station which records transaction by transaction sales data and daily reports.
  • the paper journals from the journal station of printer 26 are, typically, subsequently stored for tax audit purposes pursuant to the fiscal laws of various taxing authorities.
  • journal unit transfers to and from the point of sale terminal to and from the point of sale terminal.
  • a large volume of nonvolatile random access memory may be required in the fiscal base.
  • this approach is limited in that it does not readily allow for remote verification of journal records.
  • a verifiable electronic journal system for a point of sale device which maintains an electronic journal file in lieu of a journal print station on a two station point of sale printer.
  • Transaction information is stored in a nonvolatile random access memory.
  • a data signature is determined based on the contents of the random access memory for a journal. Both the transaction information and the data signature are transferred to the separate journal memory.
  • the journal memory may, for example, reside on the point of sale terminal and tampering with the journal transaction information may be detected by reference to the data signature which is also transferred and maintained in the electronic journal file.
  • the data signature is encrypted such as by a shared key encryption scheme and the associated public key is also transferred and stored in the electronic journal file from the device, such as a fiscal base, which is tracking the transaction information as it is created.
  • a hashing technique is preferably used so that a comparatively small NVRAM may be utilized to support generation of a transaction information set for an electronic journal file for a journal period.
  • the data signature is an encrypted version of a message digest which is a running value reflecting the total of transaction information passed to the electronic journal file during a journal period.
  • a method for providing a verifiable electronic journal system for a point of sale device is provided.
  • Transaction information related to transactions such as retail sales and taxes on those sales, is received.
  • the transaction information is stored in a random-access memory which is located within the point of sale device.
  • a data signature is determined based on the transaction information contained in the random access memory responsive to a journal update event.
  • the transaction information contained in the random-access memory is then transferred to a first portion of a journal memory separate from the random-access memory responsive to the journal update event.
  • the journal memory is preferably maintained in a point of sale terminal coupled, such as over a communications network, to the point of sale device.
  • the data signature is transferred to a second portion of the journal memory responsive to the journal update event.
  • the transaction information is also transmitted to a printer for printing, for example, to print a customer sales receipt.
  • the printer may be a fiscal printer and the point of sale device may be a fiscal processor card integrated in the fiscal printer.
  • the transaction information may include sales amount information on transactions and receiving the transaction information may be followed by calculating a tax due based on the sales amount information. Alternatively the transaction information may include a tax due.
  • the journal update event may be generated responsive to completion of a journal period.
  • the journal update event may be generated when a predetermined amount of transaction information is stored in the random access memory and the random-access memory may be reused to store additional transaction information by overwriting previously stored transaction information.
  • a plurality of journal update events may be generated during a journal period and operations of storing the transaction information, determining a data signature, transferring the transaction information, transferring the data signature and reusing the random-access memory are then repeated for each of the journal update events during the journal period according to the hashing function thereby periodically transferring a block of transaction information stored in the random-access memory to the journal memory while determining the data signature as a running value associated with the transaction information received during the journal period.
  • security may be provided by encrypting the data signature using a shared key.
  • the shared key is then transferred to a third portion of the journal memory responsive to at least one of the plurality of journal update events.
  • the verifiable electronic journal system may then be audited.
  • Auditing operations for the embodiments of the present invention utilizing an encrypted data signature include decrypting the data signature in the second portion of the journal memory using the shared key in the third portion of the journal memory.
  • a verification data signature is determined from the transaction information in the first portion of the journal memory using the hashing technique. The verification data signature is compared to the decrypted data signature to determine if the transaction information in the first portion of the journal memory has been modified from the transaction information transferred from the random-access memory during the journal period.
  • a point of sale device having a verifiable electronic journal system including a means for receiving transaction information and a means for determining a journal update event.
  • a random-access memory is coupled to the means for receiving which is configured to store the transaction information.
  • a means responsive to the journal update event determines a data signature based on the contents of the random access memory.
  • a journal memory having a first portion configured to store the transaction information and a second portion configured to store the data signature.
  • the journal memory is separate from the random-access memory and, preferably, is located remote from and communicatively coupled to the point of sale device, such as over a communications network.
  • a means responsive to the journal update event is provided for transferring transaction information from the random-access memory to the first portion of the journal memory and the data signature from the means for determining a data signature to the second portion of the journal memory.
  • the present invention provides for a verifiable electronic journal system that may be used in lieu of a printed journal record.
  • This provides for reduced costs and the added capability for remote auditing of the journal, such as by a taxing authority, over a computer communications network, while still maintaining, the ability to detect tampering.
  • the present invention may be advantageously implemented using existing hardware such as existing fiscal printer devices.
  • FIG. 1 is a block diagram of a conventional fiscal printer device
  • FIG. 2 is a block diagram of a verifiable electronic journal according to an embodiment of the present invention.
  • FIG. 3 is a flowchart illustrating operations for creating a verifiable electronic journal file according to an embodiment of the present invention
  • FIG. 4 is a block diagram of a verifiable electronic journal including hashing according to an embodiment of the present invention
  • FIG. 5 is a block diagram of a verifiable electronic journal point of sale device according to an embodiment of the present invention.
  • FIG. 6 is a flowchart illustrating verification operations according to an embodiment of the present invention.
  • the present invention provides methods and systems for electronic journaling which maintain control over printed and journaled transaction information such as sales and tax data.
  • data security is provided using standard data security algorithms. More particularly, a shared keyed methodology, such as that provided by RSA Data Security, Inc. is utilized.
  • a public (shared) and private key is generated and stored in its secured memory.
  • An electronic journal file is created, such as at the point of sale terminal associated with the point of sale device, with the contents of the journal controlled by the point of sale device (such as a fiscal logic circuit).
  • Electronic journal file 50 includes a first portion 52 containing an unencrypted listing of the transaction information, for example, the data that would be printed to the paper roll and/or journal station of a current fiscal printer.
  • a data signature is stored in second portion 54 of electronic journal file 50 .
  • the data signature is preferably an encrypted value used to verify that the print data from portion 52 has not been altered.
  • a printer public or shared key is stored in portion 56 which is used to decrypt the data signature for the purposes of verifying the data integrity.
  • a printer serial number is stored in portion 58 of electronic journal memory 50 to validate that the public (shared) printer key in portion 56 is correct for the respective device.
  • an electronic journal memory 50 provides a tamper-evident electronic journal.
  • the resulting journal data is provided in a manner that is both freely usable by the retailer for generating its own reports, and auditable, for example, by a taxing authority.
  • this auditing may be carried out either remotely by a government authority using a special utility or onsite using the device, such as a POS terminal, containing the verifiable electronic journal file.
  • each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations can be implemented by computer program instructions.
  • These program instructions may be provided to a processor to produce a machine, such that the instructions which execute on the processor create means for implementing the functions specified in the flowchart block or blocks.
  • the computer program instruction may be executed by a processor to cause a series of operational steps to be performed by the processor to produce a computer implemented process such that the instructions which execute on the processor provide steps for implementing the functions specified in the flowchart block or blocks.
  • blocks of the flowchart illustrations support combinations of means for performing the specified functions, combinations of steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations, can be implemented by special purpose hardware-based systems which perform the specified functions or steps, or combinations of special purpose hardware and computer instructions.
  • the point of sale device of the present invention such as a fiscal processor card, generates print and journal data by known procedures (block 100 ).
  • This transaction information is handled, in part, according to known procedures by sending customer receipt information to a point of sale printer (block 102 ).
  • the journal data is buffered and stored in a NVRAM of the point of sale device instead of being transmitted to the printer journal station of a two station printer as is currently done (block 102 ).
  • the point of sale device determines if a hash block is full. If the hash block is not yet full, operations return to block 100 as additional transaction information is received.
  • the processor of the point of sale device for example, the fiscal processor of a fiscal base, hashes the block of data to create a running message digest at block 106 . The fiscal processor then sends the original data from the hash block to the point of sale terminal or other device where the electronic journal file is being maintained and deletes that block from the local NVRAM as illustrated at block 108 .
  • the point of sale terminal or other journal maintaining device appends the most recently received data block to the print data portion 52 of the electronic journal file 50 as illustrated at block 110 .
  • the system determines whether a journal period is completed which would trigger closing out the currently utilized electronic journal file 50 . If not, operations return to block 100 through block 112 continuing receipt and hashing of transaction information.
  • the fiscal processor creates a data signature value by encrypting the message digest (block 114 ) and then transmits the data signature and the printer public or shared key for storage in respective portions 54 , 56 , of electronic journal file/memory 50 (block 115 ).
  • the message digest itself is transmitted as the data signature at block 115 and there is no public or shared key to transmit.
  • a device identifier such as a serial number of the generating device, may also be transferred.
  • the receiving point of sale terminal or other upstream device maintaining the electronic journal file appends the receive data signature and printer public key to the print data in the electronic journal file 50 . This completes a journal period and closes the electronic journal file 50 . In embodiments including transfer of a device identifier, the identifier is also appended.
  • nonvolatile random access memory 120 includes a portion for operation as an electronic journal buffer 122 and a portion 124 maintaining the running message digest associated with hash function 126 and data blocks passing through electronic journal buffer 122 .
  • hash blocks # 1 through #N pass successively through electronic journal buffer 122 , are transmitted to electronic journal file 50 on the point of sale terminal and are further passed through hash function 126 to update the running, message digest 124 .
  • NVRAM 120 and hash function 126 are included in point of sale device 118 .
  • hash function 126 uses the current running message digest 124 and the most recent hash block #X being transferred to generate an updated message digest which is, in turn, iteratively stored as the running message digest in portion 124 of nonvolatile random access memory 120 .
  • FIG. 5 operations illustrated in blocks 114 through 116 for signature creation and file completion at the end of a journal period are further illustrated for an embodiment of a point of sale device 118 according to the present invention.
  • the closing operations taking place at the point of sale terminal in the illustrated embodiment of FIG. 5 result in an electronic journal memory or file which is closed so that no alterations may be made which cannot be detected using the authentication techniques described herein.
  • printer private key 132 , printer public key 134 and printer serial number 136 are all stored in portions of electronically programmable read only fiscal memory 130 .
  • the printer private key 132 and message digest 124 are used by encryption algorithm 138 to generate a data signature which is stored in the data signature portion 54 of the electronic journal file 50 .
  • the printer public key 134 and printer serial number 136 are transferred and stored in portions 56 and 58 respectively of the electronic journal file 50 .
  • the systems and methods of the present invention can be implemented using hardware such as the fiscal base 24 discussed previously with reference to FIG. 1 .
  • random access memory 30 may be provided with a portion dedicated to serve as NVRAM 120 .
  • fiscal memory EPROM 34 may be utilized to store the encryption information for use in encrypting the message digest to provide an encrypted data signature.
  • FIGS. 2, 4 and 5 may be provided by hardware, software, or a combination of the above. While various components of the point of sale device 118 have been illustrated in FIGS. 4 and 5, in part, as discrete elements, they may, in practice, be implemented by a microcontroller including input and output ports and running software code, by custom or hybrid integrated circuits, by discrete components or by a combination of the above.
  • memory 120 may be contained within a processor such as fiscal processor 28 (FIG. 1 ).
  • various of the operations, such as the hashing function 126 and the encryption algorithm 138 may be implemented within a processor such as fiscal processor 28 (FIG. 1 ). More generally, as described above, operations according to the present invention may be realized in the hardware of existing fiscal bases 24 which, when so configured, provide a point of sale device according to the present invention.
  • the data signature contained in the journal memory is decrypted using the shared key contained in the journal memory by applying the agreed on encryption algorithm 138 (FIG. 5 ).
  • a verification data signature is determined from the transaction information contained in the electronic journal data portion 52 using the agreed hash function 126 .
  • the verification data signature is compared to the decrypted data signature to determine if the transaction information in the journal memory has been modified from the transaction information which was originally transferred from the random access memory of the acquiring point of sale device, such as the fiscal base, during the journal period. If the two values do not match, then the print data in portion 52 of the electronic journal 50 is not verified indicating that the data in portion 52 may have been tampered with.
  • the verifiable electronic journaling methods and systems of the present invention enable the generation of a secure fiscal journal file at the point of sale terminal as any tampering with the journal data can be detected.
  • Operations according to the present invention can generally be implemented within the hardware design structure of currently engineered fiscal base devices with the advantage of not requiring that such fiscal base devices include a two station print capability for generating a paper journal.
  • operations according to the present invention utilize hashing and upstream maintenance of the electronic journal file, thereby allowing existing fiscal memory sizes to be maintained.
  • Transaction information need not be written to the fiscal device's electronically programmable read only memory as the journal file is both maintained and verifiable remote from the fiscal base unit.
  • fiscal memory may continue to be utilized to provide functions such as those presently provided by known fiscal printer devices. Accordingly, when the methods of the present invention are implemented concurrently with use of a fiscal memory EPROM device such as that illustrated in FIG. 1, the lifetime of a given sized fiscal memory EPROM 34 is not affected by electronic journaling activities.
  • the methods and systems of the present invention further provide improved capabilities as the electronic journal may be located either at the point of sale terminal or in a device, such as a networked computer, which is remote from the terminal but may be connected to the terminal or a fiscal base using a network interface. Accordingly, verification operations may be implemented not only without use of the fiscal base device or printer, but may even be implemented from a location remote from the point of sale terminal or other location where the electronic journal is maintained.
  • a device such as a networked computer

Abstract

A point of sale device having a verifiable electronic journal system which maintains an electronic journal file in lieu of using a journal print station. Transaction information is first stored in a non-volatile random access memory. A data signature is determined based on the contents of the random access memory for a journal. Both the transaction information and the data signature are transferred to the separate journal memory. The journal memory may, for example, reside on the point of sale terminal and tampering with the journal transaction information may be detected by reference to the data signature which is also transferred and maintained in the electronic journal file. Preferably, the data signature is encrypted such as by a shared key encryption scheme and the associated public key is also transferred and stored in the electronic journal file from the device, such as a fiscal base, which is tracking the transaction information as it is created. A hashing technique is preferably used so that a comparatively small NVRAM may be utilized to support generation of a transaction information set for an electronic journal file for a journal period. Accordingly, the data signature is an encrypted version of a message digest which is a running value reflecting the total of transaction information passed to the electronic journal file during a journal period.

Description

FIELD OF THE INVENTION
The present invention relates to point of sale systems in general and in particular to journals for such transaction based devices. The present invention further relates to methods for using point of sale systems.
BACKGROUND OF THE INVENTION
Face to face retail sales transactions take place at the point of sale or what is commonly referred to as the checkout line or counter. It is at this location that the customer pays for the goods purchased, typically by either cash, check, charge or debit card. To effectuate the sale, many retailers presently use electronic devices to facilitate and provide a record of transactions. Such a point of sale system may include a scanner for reading coded product information, a terminal for manual entry of transaction information and storage of currency, a display for displaying transaction information and a printer which may be used to produce a documentary record or journal for the business and a printed receipt for the customer.
As part of the check out procedure, the sales price of each item purchased is typically entered into the point of sale terminal. Each item price and a total is printed by the point of sale printer on a customer receipt and may also be printed on a separate journal by the same point of sale printer. A tax due is commonly also determined and printed on the customer receipt. The customer receipt is then provided from the printer to the customer.
In a two station point of sale printer, the second printer station maintains a journal record of all sales transactions. This provides a written record for auditing sales activity such as gross sales amounts and taxes collected during a journal period covered by the journal record. This information could be used, for example, by a taxing authority to determine if a retailer has submitted payment to the taxing authority of all taxes collected from customers.
Where governmental authorities acquire an interest in retail journal information, such as through value added tax laws or sales tax laws, the respective tax laws frequently define the format and content of printed receipts and mandate secure methods of sales data capture. It is known to respond to such “fiscal” requirements by providing a fiscal printer such as the 3F printer from International Business Machines, Inc. of Armonk, N.Y. With such a fiscal printer, a secure (i.e., tamper-evident or resistant enclosure) logic card with dedicated nonvolatile random access memory (NVRAM) and electronically programmable read only memory (EPROM) may be placed both physically and logically between a point of sale terminal and a point of sale printer which generates customer receipts and journal records.
With a fiscal printer, such as the Model 3F, the point of sale terminal may be connected to a fiscal base device which is secured to the point of sale printer and which controls all printing functions by a communications link such as a serial communications link. An example of such a fiscal base is illustrated in FIG. 1.
Point of sale terminal 10 is connected to fiscal base 24 over communications link 22. Fiscal printer 20 in turn includes both fiscal base 24 and two station printer 26.
Fiscal base 24 includes a fiscal processor 28 or other control means for controlling journal and printing operations. Fiscal base 24 further includes a battery backed (nonvolatile) random access memory 30 to store intermediate sales and tax totals during a journal period. As shown in FIG. 1, fiscal base 24 further includes a separate program EPROM 32 and fiscal memory EPROM 34. A separate fiscal memory EPROM 34 is provided, encased in epoxy, for permanent storage of data, which typically includes daily sales and tax totals for some number of daily journal periods depending upon the capacity of fiscal memory EPROM 34. Program EPROM 32 may then be used for program information or data values used by fiscal processor 28. Also shown in FIG. 1 is a time of day clock 36 which may be used for tracking transactions and journal periods.
Two station printer 26 is controlled by fiscal processor 28. A first printing station provides a customer receipt station whose printing is controlled by fiscal processor 28 to assure that the sales receipt provided to the customer has the correct data on it related to a particular transaction. The second station provides a journal station which records transaction by transaction sales data and daily reports. The paper journals from the journal station of printer 26 are, typically, subsequently stored for tax audit purposes pursuant to the fiscal laws of various taxing authorities.
Various countries with fiscal taxing laws have expressed an interest in replacing the current system of journal paper tape storage with a digital electronic journal record. Such a transition could reduce equipment, consumable, record-handling and storage costs for retailers. It could allow the use of single station lower cost printers and halve paper consumption. While both retailers and fiscal authorities may recognize the potential advantages of an electronic journal, there are continued concerns that such electronic journal files could be readily modified by an end user intent on defrauding the government.
One proposed solution also relying on a fiscal printer device approach but using an electronic journal has been proposed. This approach utilizes a checksum calculated from all of the data stored in the fiscal secured memory using a key that is not known outside the fiscal printer. The entire journal data block may then be transferred from the fiscal base 24 to a point of sale terminal 10 rather than being maintained in the secure fiscal printer. However, this approach fails to address all of the objectives for such a verifiable electronic journal system. For example, to validate the data in the point of sale terminal, the data must be fed back to the fiscal base where an associated checksum can be obtained from fiscal memory and compared to a new checksum generated from the data downloaded from the point of sale terminal. Furthermore, depending upon the size of the journal unit transferred to and from the point of sale terminal, a large volume of nonvolatile random access memory may be required in the fiscal base. In addition, it may be necessary to sustain data in fiscal memory EPROM for a greater period of time for potential verification requiring an increased size of fiscal memory EPROM. Finally, this approach is limited in that it does not readily allow for remote verification of journal records.
SUMMARY OF THE INVENTION
Accordingly, it is an object of the present invention to provide a verifiable electronic journal system for a point of sale device which allows detection of any tampering with journal data.
It is a further object of the present invention to provide such a verifiable electronic journal system for a point of sale device which does not require an increase in the size of NVRAM or the secure EPROM contained on the printer device such as a fiscal base.
It is a further object of the present invention to provide a verifiable electronic journal system for a point of sale device which may be remotely verified.
These and other objects are provided according to the present invention by a verifiable electronic journal system for a point of sale device which maintains an electronic journal file in lieu of a journal print station on a two station point of sale printer. Transaction information is stored in a nonvolatile random access memory. A data signature is determined based on the contents of the random access memory for a journal. Both the transaction information and the data signature are transferred to the separate journal memory. The journal memory may, for example, reside on the point of sale terminal and tampering with the journal transaction information may be detected by reference to the data signature which is also transferred and maintained in the electronic journal file. Preferably, the data signature is encrypted such as by a shared key encryption scheme and the associated public key is also transferred and stored in the electronic journal file from the device, such as a fiscal base, which is tracking the transaction information as it is created. A hashing technique is preferably used so that a comparatively small NVRAM may be utilized to support generation of a transaction information set for an electronic journal file for a journal period. Accordingly, the data signature is an encrypted version of a message digest which is a running value reflecting the total of transaction information passed to the electronic journal file during a journal period.
In one embodiment of the present invention, a method for providing a verifiable electronic journal system for a point of sale device is provided. Transaction information related to transactions, such as retail sales and taxes on those sales, is received. The transaction information is stored in a random-access memory which is located within the point of sale device. A data signature is determined based on the transaction information contained in the random access memory responsive to a journal update event. The transaction information contained in the random-access memory is then transferred to a first portion of a journal memory separate from the random-access memory responsive to the journal update event. The journal memory is preferably maintained in a point of sale terminal coupled, such as over a communications network, to the point of sale device. The data signature is transferred to a second portion of the journal memory responsive to the journal update event.
In further embodiments of the method aspects of the present invention, the transaction information is also transmitted to a printer for printing, for example, to print a customer sales receipt. The printer may be a fiscal printer and the point of sale device may be a fiscal processor card integrated in the fiscal printer. The transaction information may include sales amount information on transactions and receiving the transaction information may be followed by calculating a tax due based on the sales amount information. Alternatively the transaction information may include a tax due.
In a further aspect of the present invention, the journal update event may be generated responsive to completion of a journal period. Alternatively, using a technique such as a hashing function, the journal update event may be generated when a predetermined amount of transaction information is stored in the random access memory and the random-access memory may be reused to store additional transaction information by overwriting previously stored transaction information. A plurality of journal update events may be generated during a journal period and operations of storing the transaction information, determining a data signature, transferring the transaction information, transferring the data signature and reusing the random-access memory are then repeated for each of the journal update events during the journal period according to the hashing function thereby periodically transferring a block of transaction information stored in the random-access memory to the journal memory while determining the data signature as a running value associated with the transaction information received during the journal period.
In yet another aspect of the present invention, security may be provided by encrypting the data signature using a shared key. The shared key is then transferred to a third portion of the journal memory responsive to at least one of the plurality of journal update events. The verifiable electronic journal system may then be audited. Auditing operations for the embodiments of the present invention utilizing an encrypted data signature include decrypting the data signature in the second portion of the journal memory using the shared key in the third portion of the journal memory. In addition, a verification data signature is determined from the transaction information in the first portion of the journal memory using the hashing technique. The verification data signature is compared to the decrypted data signature to determine if the transaction information in the first portion of the journal memory has been modified from the transaction information transferred from the random-access memory during the journal period.
While the invention has been described above primarily with respect to the method aspects of the invention, both systems and computer program products are also provided. For example, a point of sale device having a verifiable electronic journal system is provided including a means for receiving transaction information and a means for determining a journal update event. A random-access memory is coupled to the means for receiving which is configured to store the transaction information. A means responsive to the journal update event determines a data signature based on the contents of the random access memory. Also provided is a journal memory having a first portion configured to store the transaction information and a second portion configured to store the data signature. The journal memory is separate from the random-access memory and, preferably, is located remote from and communicatively coupled to the point of sale device, such as over a communications network. A means responsive to the journal update event is provided for transferring transaction information from the random-access memory to the first portion of the journal memory and the data signature from the means for determining a data signature to the second portion of the journal memory.
Accordingly, the present invention provides for a verifiable electronic journal system that may be used in lieu of a printed journal record. This provides for reduced costs and the added capability for remote auditing of the journal, such as by a taxing authority, over a computer communications network, while still maintaining, the ability to detect tampering. The present invention may be advantageously implemented using existing hardware such as existing fiscal printer devices.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram of a conventional fiscal printer device;
FIG. 2 is a block diagram of a verifiable electronic journal according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating operations for creating a verifiable electronic journal file according to an embodiment of the present invention;
FIG. 4 is a block diagram of a verifiable electronic journal including hashing according to an embodiment of the present invention;
FIG. 5 is a block diagram of a verifiable electronic journal point of sale device according to an embodiment of the present invention; and
FIG. 6 is a flowchart illustrating verification operations according to an embodiment of the present invention.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
The present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. As will be appreciated by one of skill in the art, the present invention may be embodied as methods, systems or computer program products. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment or an embodiment combining software and hardware aspects.
The present invention provides methods and systems for electronic journaling which maintain control over printed and journaled transaction information such as sales and tax data. Preferably, data security is provided using standard data security algorithms. More particularly, a shared keyed methodology, such as that provided by RSA Data Security, Inc. is utilized. For each point of sale device, a public (shared) and private key is generated and stored in its secured memory. An electronic journal file is created, such as at the point of sale terminal associated with the point of sale device, with the contents of the journal controlled by the point of sale device (such as a fiscal logic circuit).
The various portions of the electronic journal file or memory for a particular embodiment of the present invention are illustrated in FIG. 2. Electronic journal file 50 includes a first portion 52 containing an unencrypted listing of the transaction information, for example, the data that would be printed to the paper roll and/or journal station of a current fiscal printer. A data signature is stored in second portion 54 of electronic journal file 50. The data signature is preferably an encrypted value used to verify that the print data from portion 52 has not been altered. A printer public or shared key is stored in portion 56 which is used to decrypt the data signature for the purposes of verifying the data integrity. Finally, in the illustrated embodiment, a printer serial number is stored in portion 58 of electronic journal memory 50 to validate that the public (shared) printer key in portion 56 is correct for the respective device. As the use of public/private keyed encryption algorithms are generally known, their operation will not be described in further detail herein except in connection with the particularized use of the shared key in the methods and systems of the present invention.
As will be described further herein, the use of an electronic journal memory 50 according to the methods and systems of the present invention provides a tamper-evident electronic journal. The resulting journal data is provided in a manner that is both freely usable by the retailer for generating its own reports, and auditable, for example, by a taxing authority. Furthermore, this auditing may be carried out either remotely by a government authority using a special utility or onsite using the device, such as a POS terminal, containing the verifiable electronic journal file.
Operations of the present invention will now be described with respect to the flowcharts of FIG. 3 and, subsequently, FIG. 6. It will be understood that each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations, can be implemented by computer program instructions. These program instructions may be provided to a processor to produce a machine, such that the instructions which execute on the processor create means for implementing the functions specified in the flowchart block or blocks. The computer program instruction, may be executed by a processor to cause a series of operational steps to be performed by the processor to produce a computer implemented process such that the instructions which execute on the processor provide steps for implementing the functions specified in the flowchart block or blocks.
Accordingly, blocks of the flowchart illustrations support combinations of means for performing the specified functions, combinations of steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations, can be implemented by special purpose hardware-based systems which perform the specified functions or steps, or combinations of special purpose hardware and computer instructions. 9
Referring now to the flowchart of FIG. 3, during point of sale operations, the point of sale device of the present invention, such as a fiscal processor card, generates print and journal data by known procedures (block 100). This transaction information is handled, in part, according to known procedures by sending customer receipt information to a point of sale printer (block 102). However, the journal data is buffered and stored in a NVRAM of the point of sale device instead of being transmitted to the printer journal station of a two station printer as is currently done (block 102).
It is desirable, however, to limit the amount of data which is maintained in the NVRAM, of a point of sale device such as a fiscal base. By limiting the size of the buffer required for the electronic journal system, the cost of NVRAM is minimized along with the time for individual data transfers to the point of sale terminal or other upstream device on which the electronic journal file is maintained. Accordingly, to enable periodic clearing of the NVRAM containing the current buffer of journal transaction information, “hashing” techniques are used. Known hashing techniques for memory management allow blocks of buffered memory contents to be successively transferred while maintaining a small running value, sometimes referred to as a message digest, that mathematically uniquely corresponds to the entire transferred contents of information. The application of such a hashing technique according to the present invention is further illustrated in FIG. 4.
At block 104 of FIG. 3, the point of sale device determines if a hash block is full. If the hash block is not yet full, operations return to block 100 as additional transaction information is received. At block 106, once a hash block is full, or a journal period ends with a partially full hash block, the processor of the point of sale device, for example, the fiscal processor of a fiscal base, hashes the block of data to create a running message digest at block 106. The fiscal processor then sends the original data from the hash block to the point of sale terminal or other device where the electronic journal file is being maintained and deletes that block from the local NVRAM as illustrated at block 108.
The point of sale terminal or other journal maintaining device appends the most recently received data block to the print data portion 52 of the electronic journal file 50 as illustrated at block 110. At block 112, the system determines whether a journal period is completed which would trigger closing out the currently utilized electronic journal file 50. If not, operations return to block 100 through block 112 continuing receipt and hashing of transaction information.
If the journal period is completed, the fiscal processor creates a data signature value by encrypting the message digest (block 114) and then transmits the data signature and the printer public or shared key for storage in respective portions 54, 56, of electronic journal file/memory 50 (block 115). In embodiments where encryption is not used, the message digest itself is transmitted as the data signature at block 115 and there is no public or shared key to transmit. A device identifier, such as a serial number of the generating device, may also be transferred.
At block 116, the receiving point of sale terminal or other upstream device maintaining the electronic journal file appends the receive data signature and printer public key to the print data in the electronic journal file 50. This completes a journal period and closes the electronic journal file 50. In embodiments including transfer of a device identifier, the identifier is also appended.
Data hashing operations as applied to the present invention are further schematically illustrated in FIG. 4. As shown in FIG. 4, nonvolatile random access memory 120 includes a portion for operation as an electronic journal buffer 122 and a portion 124 maintaining the running message digest associated with hash function 126 and data blocks passing through electronic journal buffer 122. As illustrated in FIG. 4, hash blocks #1 through #N pass successively through electronic journal buffer 122, are transmitted to electronic journal file 50 on the point of sale terminal and are further passed through hash function 126 to update the running, message digest 124. NVRAM 120 and hash function 126 are included in point of sale device 118. As illustrated in FIG. 4, hash function 126 uses the current running message digest 124 and the most recent hash block #X being transferred to generate an updated message digest which is, in turn, iteratively stored as the running message digest in portion 124 of nonvolatile random access memory 120.
Referring now to FIG. 5, operations illustrated in blocks 114 through 116 for signature creation and file completion at the end of a journal period are further illustrated for an embodiment of a point of sale device 118 according to the present invention. The closing operations taking place at the point of sale terminal in the illustrated embodiment of FIG. 5 result in an electronic journal memory or file which is closed so that no alterations may be made which cannot be detected using the authentication techniques described herein. In the embodiment illustrated in FIG. 5, printer private key 132, printer public key 134 and printer serial number 136 are all stored in portions of electronically programmable read only fiscal memory 130. At the end of a journal period, the printer private key 132 and message digest 124 are used by encryption algorithm 138 to generate a data signature which is stored in the data signature portion 54 of the electronic journal file 50. The printer public key 134 and printer serial number 136, respectively, are transferred and stored in portions 56 and 58 respectively of the electronic journal file 50.
As can be seen from the illustrated embodiment's use of both fiscal memory and nonvolatile RAM 130, 120, the systems and methods of the present invention can be implemented using hardware such as the fiscal base 24 discussed previously with reference to FIG. 1. In this case, random access memory 30 may be provided with a portion dedicated to serve as NVRAM 120. Furthermore, fiscal memory EPROM 34 may be utilized to store the encryption information for use in encrypting the message digest to provide an encrypted data signature.
As will be appreciated by those of skill in this art, the above-described aspects of the present invention in FIGS. 2, 4 and 5 may be provided by hardware, software, or a combination of the above. While various components of the point of sale device 118 have been illustrated in FIGS. 4 and 5, in part, as discrete elements, they may, in practice, be implemented by a microcontroller including input and output ports and running software code, by custom or hybrid integrated circuits, by discrete components or by a combination of the above. For example, memory 120 may be contained within a processor such as fiscal processor 28 (FIG. 1). Similarly, various of the operations, such as the hashing function 126 and the encryption algorithm 138 may be implemented within a processor such as fiscal processor 28 (FIG. 1). More generally, as described above, operations according to the present invention may be realized in the hardware of existing fiscal bases 24 which, when so configured, provide a point of sale device according to the present invention.
Referring now to FIG. 6, operations for auditing the verifiable electronic journal system will now be described for an embodiment of the present invention. At block 150, the data signature contained in the journal memory is decrypted using the shared key contained in the journal memory by applying the agreed on encryption algorithm 138 (FIG. 5). At block 152, a verification data signature is determined from the transaction information contained in the electronic journal data portion 52 using the agreed hash function 126. Finally, at block 154, the verification data signature is compared to the decrypted data signature to determine if the transaction information in the journal memory has been modified from the transaction information which was originally transferred from the random access memory of the acquiring point of sale device, such as the fiscal base, during the journal period. If the two values do not match, then the print data in portion 52 of the electronic journal 50 is not verified indicating that the data in portion 52 may have been tampered with.
The verifiable electronic journaling methods and systems of the present invention enable the generation of a secure fiscal journal file at the point of sale terminal as any tampering with the journal data can be detected. Operations according to the present invention can generally be implemented within the hardware design structure of currently engineered fiscal base devices with the advantage of not requiring that such fiscal base devices include a two station print capability for generating a paper journal. Furthermore, operations according to the present invention utilize hashing and upstream maintenance of the electronic journal file, thereby allowing existing fiscal memory sizes to be maintained. Transaction information need not be written to the fiscal device's electronically programmable read only memory as the journal file is both maintained and verifiable remote from the fiscal base unit. However, fiscal memory may continue to be utilized to provide functions such as those presently provided by known fiscal printer devices. Accordingly, when the methods of the present invention are implemented concurrently with use of a fiscal memory EPROM device such as that illustrated in FIG. 1, the lifetime of a given sized fiscal memory EPROM 34 is not affected by electronic journaling activities.
The methods and systems of the present invention further provide improved capabilities as the electronic journal may be located either at the point of sale terminal or in a device, such as a networked computer, which is remote from the terminal but may be connected to the terminal or a fiscal base using a network interface. Accordingly, verification operations may be implemented not only without use of the fiscal base device or printer, but may even be implemented from a location remote from the point of sale terminal or other location where the electronic journal is maintained.
In the drawings and specification, there have been disclosed typical preferred embodiments of the invention and, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation, the scope of the invention being set forth in the following claims.

Claims (40)

That which is claimed:
1. A method for providing a verifiable electronic journal system for a point of sale device comprising:
receiving transaction information related to a plurality of sales transactions;
storing the transaction information in a random-access memory;
determining a data signature based on the transaction information contained in the random access memory and a previously determined data signature responsive to a journal update event;
transferring the transaction information contained in the random-access memory to a first portion of a journal memory separate from the random-access memory responsive to the journal update event; and
transferring the data signature to a second portion of the journal memory responsive to the journal update event.
2. A method according to claim 1 further comprising the step of transmitting the transaction information to a printer for printing.
3. A method according to claim 1 wherein the transaction information includes sales amount information on transactions and wherein the receiving step is followed by the step of calculating a tax clue based on the sales amount information.
4. A method according to claim 1 wherein the transaction information includes a tax due.
5. A method according to claim 1 further comprising the step of generating the journal update event responsive to completion of a journal period.
6. A method according to claim 1 further comprising the step of generating the journal update event when a predetermined amount of transaction information is stored in the random access memory and wherein the step of transferring the transaction information is followed by the step of reusing the random-access memory to store additional transaction information by overwriting previously stored transaction information.
7. A method according to claim 6 wherein the step of generating the journal update event comprises the step of generating a plurality of journal update events during a journal period and wherein the steps of storing the transaction information, determining a data signature, transferring the transaction information, transferring the data signature and reusing the random-access memory are repeated for each of the journal update events during the journal period according to a hashing technique thereby periodically transferring a block of transaction information stored in the random-access memory to the journal memory while determining the data signature as a running value associated with the transaction information received during the journal period wherein the previously determined data signature comprises a running value associated with the transaction information received during the journal period up to a last generated one of the plurality of journal update events.
8. A method according to claim 7 wherein the step of determining a data signature is followed by the steps of:
encrypting the data signature using a shared key; and
transferring the shared key to a third portion of the journal memory responsive to at least one of the plurality of journal update events.
9. A method according to claim 8 wherein th e step of transferring the shared key is followed by the step of auditing the verifiable electronic journal system.
10. A method according to claim 9 wherein the step of auditing the verifiable electronic journal system comprises the steps of:
decrypting the data signature in the second portion of the journal memory using the shared key in the third portion of the journal memory;
determining a verification data signature from the transaction information in the first portion of the journal memory using the hashing technique; and
comparing the verification data signature to the decrypted data signature to determine if the transaction information in the first portion of the journal memory has been modified from the transaction information transferred from the random-access memory during the journal period.
11. A method according to claim 1 wherein the step of determining a data signature is followed by the steps of:
encrypting the data signature using a shared key; and
transferring the shared key to a third portion of the journal memory responsive to at least one of the plurality of journal update events.
12. A method according to claim 11 wherein the step of transferring the shared key is followed by the step of auditing the verifiable electronic journal system.
13. A method according to claim 12 wherein the step of auditing the verifiable electronic journal system comprises the steps of:
decrypting the data signature in the second portion of the journal memory using the shared key in the third portion of the journal memory;
determining a verification data signature from the transaction information in the first portion of the journal memory; and
comparing the verification data signature to the decrypted data signature to determine if the transaction information in the first portion of the journal memory has been modified from the transaction information transferred from the random-access memory during the journal period.
14. A point of sale device having a verifiable electronic journal system comprising:
means for receiving transaction information related to a plurality of sales transactions;
means for determining a journal update event;
a random-access memory coupled to the means for receiving and configured to store the transaction information;
means responsive to the journal update event for determining a data signature based on the contents of the random access memory and a previously determined data signature;
a journal memory having a first portion configured to store the transaction information and a second portion configured to store the data signature; and
means responsive to the journal update event for transferring transaction information from the random-access memory to the first portion of the journal memory and the data signature from the means for determining a data signature to the second portion of the journal memory.
15. A system according to claim 14 further comprising interface means for connecting the point of sale device to a point of sale printer configured to print information on the plurality of transactions.
16. A system according to claim 14 wherein the programable journal memory is contained within the point of sale device.
17. A system according to claim 14 wherein the programable journal memory is located on a computer remote from the point of sale device and wherein said means for transferring further comprises network interface means for communicatively connecting the point of sale device to the computer remote from the point of sale device.
18. A system according to claim 14 wherein the transaction information includes a tax due.
19. A system according to claim 14 wherein the means for generating a journal update event comprises means for generating a journal update event responsive to the completion of a journal period.
20. A system according to claim 14 wherein the means for generating a journal event comprises means for generating the journal update event when a predetermined amount of transaction information is stored in the random access memory and further comprising hashing means for reusing the random-access memory to store additional transaction information by overwriting previously stored transaction information.
21. A system according to claim 14 wherein the means for generating a journal event comprises means for generating a plurality of journal update events during a journal period and further comprising hashing means for transferring a block of transaction information stored in the random-access memory to the journal memory responsive to each of the plurality of journal update events while determining the data signature as a running value associated with the transaction information received during the journal period wherein the previously determined data signature comprises a running value associated with the transaction information received during the journal period up to a last generated one of the plurality of journal update events.
22. A system according to claim 21 further comprising means for encrypting the data signature using a shared key and wherein the programable journal memory further has a third portion configured to store the shared key and further comprising means for transferring the shared key to the third portion of the journal memory responsive to at least one of the plurality of journal update events during the journal period.
23. A system according to claim 22 further comprising interface means for allowing access to the journal memory wherein the journal memory may be verified by a user auditing the verifiable electronic journal system using the shared key to decrypt the data signature and comparing the decrypted data signature to a verification data signature generated from transaction information in the first portion of the journal memory.
24. A system according to claim 14 further comprising means for encrypting the data signature using a shared key and wherein the programable journal memory further has a third portion configured to store the shared key and further comprises means for transferring the shared key to the third portion of the journal memory.
25. A system according to claim 24 further comprising interface means for allowing access to the journal memory wherein the journal memory may be verified by a user auditing the verifiable electronic journal system using the shared key to decrypt the data signature and comparing the decrypted data signature to a verification data signature generated from transaction information in the first portion of the journal memory.
26. A system according to claim 14 wherein the journal memory is an electronically programmable read only memory device and wherein the random-access memory is a non-volatile random-access memory device.
27. A computer program product for maintaining a verifiable journal system for a point of sale device, the computer program product comprising a computer usable storage medium having computer readable program code embodied in the medium, the computer readable program code comprising:
computer readable program code that receives transaction information related to a plurality of sales transactions;
computer readable program code that determines a journal update event;
computer readable program code that stores the transaction information in a random-access memory;
computer readable program code that determines a data signature based on the transaction information contained in the random-access memory and a previously determined data signature responsive to the journal update event;
computer readable program code that transfers the transaction information contained in the random-access memory to a first portion of a journal memory separate from the random access memory responsive to the journal update event;
computer readable program code that transfers the data signature to a second portion of the journal memory responsive to the journal update event.
28. A computer program product according to claim 27 further comprising computer readable program code that transmits the transaction information to a printer for printing.
29. A computer program product according to claim 27 wherein the transaction information includes sales amount information on transactions and further comprising computer readable program code that calculates a tax due based on the sales amount information.
30. A computer program product according to claim 27 wherein the transaction information includes a tax due.
31. A computer program product according to claim 27 further comprising computer readable program code that generates the journal update event responsive to completion of a journal period.
32. A computer program product according to claim 27 wherein the computer readable program code that generates a journal event comprises computer readable program code that generates the journal update event when a predetermined amount of transaction information is stored in the random access memory and further comprising computer readable program code that reuses the random-access memory to store additional transaction information by overwriting previously stored transaction information.
33. A computer program product according to claim 27 wherein the computer readable program code that generates a journal event comprises computer readable program code that generates a plurality of journal update events during a journal period and further comprising computer readable program code that transfers a block of transaction information stored in the random-access memory to the journal memory responsive to each of the plurality of journal update events while determining the data signature as a running value associated with the transaction information received during the journal period wherein the previously determined data signature comprises a running value associated with the transaction information received during the journal period up to a last generated one of the plurality of journal update events.
34. A computer program product according to claim 33 further comprising computer readable program code that encrypts the data signature using a shared key and and further comprising computer readable program code that transfers the shared key to a third portion of the journal memory responsive to at least one of the plurality of journal update events during the journal period.
35. A computer program product according to claim 34 further comprising computer readable program code that allows access to the journal memory wherein the journal memory may be verified by a user auditing the verifiable electronic journal system using the shared key to decrypt the data signature and comparing the decrypted data signature to a verification data signature generated from transaction information in the first portion of the journal memory.
36. A computer program product according to claim 27 further comprising computer readable program code that encrypts the data signature using a shared key and further comprising computer readable program code that transfers the shared key to a third portion of the journal memory.
37. A computer program product according to claim 36 further comprising computer readable program code that allows access to the journal memory wherein the journal memory may be verified by a user auditing the verifiable electronic journal system using the shared key to decrypt the data signature and comparing the decrypted data signature to a verification data signature generated from transaction information in the first portion of the journal memory.
38. A computer program product according to claim 27 wherein the journal memory is an electronically programmable read only memory device and wherein the random-access memory is a non-volatile random-access memory device.
39. A verifiable electronic journal system for a point of sale device, the system comprising:
an interface circuit that receives transaction information related to a plurality of sales transactions;
a random-access memory coupled to the interface circuit and configured to store the transaction information;
a hash function, that determines a data signature based on the contents of the random access memory and a previously determined data signature responsive to a journal update event;
a journal memory having a first portion configured to store the transaction information and a second portion configured to store the data signature; and
a transmit circuit that transmits transaction information from the random-access memory to the first portion of the journal memory and the data signature from the hash circuit to the second portion of the journal memory responsive to the journal update event.
40. A system according to claim 39 further comprising an encryption function that encrypts the data signature using a shared key and wherein the programmable journal memory further has a third portion configured to store the shared key and wherein the transmit circuit is further configured to transfer the shared key to the third portion of the journal memory responsive to at least one of a plurality of journal update events during a journal period.
US09/164,215 1998-09-30 1998-09-30 Verifiable electronic journal for a point of sale device and methods for using the same Expired - Lifetime US6199049B1 (en)

Priority Applications (10)

Application Number Priority Date Filing Date Title
US09/164,215 US6199049B1 (en) 1998-09-30 1998-09-30 Verifiable electronic journal for a point of sale device and methods for using the same
EP99947623A EP1118066B1 (en) 1998-09-30 1999-09-17 Verifiable electronic journal for a point of sale device and methods for using the same
CN99811522A CN1320253A (en) 1998-09-30 1999-09-17 Verifiable electronic journal for point of sale device and methods for using the same
PL99346943A PL346943A1 (en) 1998-09-30 1999-09-17 Verifiable electronic journal for a point of sale device and methods for using the same
AT99947623T ATE255756T1 (en) 1998-09-30 1999-09-17 VERIFIABLE ELECTRONIC LOGBOOK FOR A POINT OF POINT TERMINAL AND METHOD FOR USE THEREOF
HU0103629A HUP0103629A3 (en) 1998-09-30 1999-09-17 Verifiable electronic journal for a point of sale device and methods for using the same
DE69913365T DE69913365T2 (en) 1998-09-30 1999-09-17 VERIFIED ELECTRONIC LOGBOOK FOR A DEALING DEVICE AND METHOD FOR USING IT
PCT/GB1999/003105 WO2000019387A1 (en) 1998-09-30 1999-09-17 Verifiable electronic journal for a point of sale device and methods for using the same
AU61009/99A AU6100999A (en) 1998-09-30 1999-09-17 Verifiable electronic journal for a point of sale device and methods for using the same
TW088116514A TW446898B (en) 1998-09-30 1999-09-27 Verifiable electronic journal for a point of sale device and methods for using the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/164,215 US6199049B1 (en) 1998-09-30 1998-09-30 Verifiable electronic journal for a point of sale device and methods for using the same

Publications (1)

Publication Number Publication Date
US6199049B1 true US6199049B1 (en) 2001-03-06

Family

ID=22593480

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/164,215 Expired - Lifetime US6199049B1 (en) 1998-09-30 1998-09-30 Verifiable electronic journal for a point of sale device and methods for using the same

Country Status (10)

Country Link
US (1) US6199049B1 (en)
EP (1) EP1118066B1 (en)
CN (1) CN1320253A (en)
AT (1) ATE255756T1 (en)
AU (1) AU6100999A (en)
DE (1) DE69913365T2 (en)
HU (1) HUP0103629A3 (en)
PL (1) PL346943A1 (en)
TW (1) TW446898B (en)
WO (1) WO2000019387A1 (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020078152A1 (en) * 2000-12-19 2002-06-20 Barry Boone Method and apparatus for providing predefined feedback
US6510986B1 (en) * 1999-05-06 2003-01-28 Fujitsu Limited Transaction record storing device and transaction machine including same
US20030040992A1 (en) * 2001-08-23 2003-02-27 Pitney Bowes Incorporated Secure tax meter and certified service provider center for collecting sales and/or use taxes on sales that are made via the internet and/or catalog
US20030065566A1 (en) * 2001-09-28 2003-04-03 Fujitsu Limited POS terminal and system including the same by which a transaction log can be revised and registered as a new transaction
US20030105963A1 (en) * 2001-12-05 2003-06-05 Slick Royce E. Secure printing with authenticated printer key
EP1398741A2 (en) * 2002-09-10 2004-03-17 Wincor Nixdorf International GmbH Secure storage of journal data
US20040255141A1 (en) * 2003-04-22 2004-12-16 Hodder Leonard B. Fiscal data recorder
US20050193143A1 (en) * 2003-12-30 2005-09-01 Meyers Brian R. Framework for user interaction with multiple network devices
US20060064375A1 (en) * 2004-09-20 2006-03-23 Pitney Bowes Incorporated Method and system for creating and maintaining records of title for items of property
US20060080347A1 (en) * 2002-12-27 2006-04-13 Honda Motor Co., Ltd. Enhanced trade compliance system: mass amendment
US20060161968A1 (en) * 2004-12-21 2006-07-20 Nintendo Co., Ltd. Method and apparatus for secure delivery and evaluation of prototype software over a network
WO2006083219A1 (en) * 2005-02-02 2006-08-10 Retail Innovation Htt Ab System and method for registration control
US20070061579A1 (en) * 2005-09-09 2007-03-15 Microsoft Corporation Digital signing policy
US20070233551A1 (en) * 2000-02-29 2007-10-04 Ebay Inc. Method and system for harvesting feedback and comments regarding multiple items from users of a network-based transaction facility
US20080077513A1 (en) * 2000-08-08 2008-03-27 Ryan Frederick W Jr Method for collecting sales and/or use taxes on sales that are made via the internet and/or catalog
US20080256084A1 (en) * 2007-04-11 2008-10-16 The Directv Group, Inc. Method and system for using a website to perform a remote action on a set top box with a secure authorization
US7469210B1 (en) 2002-08-08 2008-12-23 Voice Signature Llc Outbound voice signature calls
US20090031369A1 (en) * 2007-07-26 2009-01-29 The Directv Group, Inc. Method and system for ordering video content from an interactive interface
US20090031345A1 (en) * 2007-07-26 2009-01-29 The Directv Group. Inc. Method and system for preordering content in a user device associated with a content processing system
US20090100065A1 (en) * 2007-10-13 2009-04-16 Jeffs Alistair E Method and system for quickly recording linear content from an interactive interface
US20090100477A1 (en) * 2007-10-13 2009-04-16 Jeffs Alistair E Method and system for ordering video content from a mobile device
US20090099859A1 (en) * 2007-10-13 2009-04-16 Jeffs Alistair E Method and system for ordering and prioritizing the downloading of content from an interactive interface
US20090099912A1 (en) * 2007-10-13 2009-04-16 Jeffs Alistair E Method and system for confirming the download of content at a user device
US20100057583A1 (en) * 2008-08-28 2010-03-04 The Directv Group, Inc. Method and system for ordering video content using a link
US20100057469A1 (en) * 2008-08-28 2010-03-04 The Directv Group, Inc. Method and system for ordering content using a voice menu system
US20100071077A1 (en) * 2008-09-12 2010-03-18 International Business Machines Corporation Apparatus, system, and method for detecting tampering of fiscal printers
US20100174915A1 (en) * 2007-05-30 2010-07-08 Milan Prokin Turnover controller
US7773730B1 (en) 2001-08-09 2010-08-10 Voice Signature Llc Voice record integrator
US20100287064A1 (en) * 2003-11-20 2010-11-11 Ebay Inc Feedback cancellation in a network-based transaction facility
US20110145658A1 (en) * 2009-12-14 2011-06-16 Seiko Epson Corporation Electronic apparatus and method of controlling electronic apparatus
US20110169385A1 (en) * 2010-01-09 2011-07-14 Seiko Epson Corporation Fiscal board receiving case and fiscal printer
US20110225059A1 (en) * 2010-03-12 2011-09-15 Mittag Judy L Pos sales transaction safety net
US20110238541A1 (en) * 2010-03-28 2011-09-29 Lenovo (Singapore) Pte. Ltd. Audit trails for electronic financial transactions
US8290809B1 (en) 2000-02-14 2012-10-16 Ebay Inc. Determining a community rating for a user using feedback ratings of related users in an electronic environment
JP2016181094A (en) * 2015-03-24 2016-10-13 Necソリューションイノベータ株式会社 Information processing device, information processing method, and program
US9614934B2 (en) 2000-02-29 2017-04-04 Paypal, Inc. Methods and systems for harvesting comments regarding users on a network-based facility
WO2017155742A1 (en) * 2016-03-08 2017-09-14 Manifold Technology, Inc. Data storage system with blockchain technology
US10282554B2 (en) 2015-04-14 2019-05-07 Manifold Technology, Inc. System and method for providing a cryptographic platform for exchanging information
US10380656B2 (en) 2015-02-27 2019-08-13 Ebay Inc. Dynamic predefined product reviews
US20200159510A1 (en) * 2018-11-16 2020-05-21 Fujitsu Limited Computer program generation
US10667008B1 (en) 2014-12-18 2020-05-26 The Directv Group, Inc. Method and system for setting and receiving user notifications for content available far in the future
CN111459753A (en) * 2020-03-26 2020-07-28 平安科技(深圳)有限公司 Point-of-sale terminal data processing method, device, computer equipment and storage medium
WO2022022126A1 (en) * 2020-07-30 2022-02-03 International Business Machines Corporation Validating tracked portions of received sensor data using computer cryptographic processing
US11496291B2 (en) 2020-07-30 2022-11-08 International Business Machines Corporation Validating received sensor data using computer cryptographic processing
US20220391539A1 (en) * 2021-06-06 2022-12-08 International Business Machines Corporation Validating primary subsets of received sensor data using computer cryptographic processing
US11645427B2 (en) 2020-11-29 2023-05-09 Bank Of America Corporation Detecting unauthorized activity related to a device by monitoring signals transmitted by the device
CN117176472A (en) * 2023-10-30 2023-12-05 杭州海康威视数字技术股份有限公司 Data tamper-proof method, device and system based on intelligent password security equipment

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MY136255A (en) * 2000-06-16 2008-09-30 Ibm Hacking susceptibility
WO2010076226A1 (en) * 2008-12-30 2010-07-08 Arcelik Anonim Sirketi A cash register and the control method thereof
US20130293918A1 (en) * 2010-11-11 2013-11-07 Seiko Epson Corporation Fiscal Printer
CN102163353B (en) * 2011-02-25 2012-12-05 广州广电运通金融电子股份有限公司 Electronic journal diary intelligent analysis system and method
JP2014052847A (en) * 2012-09-07 2014-03-20 Seiko Epson Corp Fiscal printer and method for controlling fiscal printer
TWI505208B (en) * 2013-04-30 2015-10-21 Partner Tech Corp Portable e-pay system and method
US9760881B2 (en) * 2013-04-30 2017-09-12 Partner Tech Corp Portable e-pay system and method
DE102018108680A1 (en) * 2018-04-12 2019-10-17 Bundesdruckerei Gmbh A method for tamper-resistant storage of transaction data in a system with electronic cash registers and system
CN111881012A (en) * 2020-08-10 2020-11-03 深圳大势智能科技有限公司 Log recording method, device, equipment and storage medium

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4144567A (en) 1976-05-26 1979-03-13 Tokyo Electric Co., Ltd. Electronic cash register
US4186439A (en) * 1977-12-29 1980-01-29 Casio Computer Co., Ltd. Electronic cash register for totalizing sales data on a time zone basis
US4213179A (en) * 1977-10-08 1980-07-15 Tokyo Electric Co., Ltd. Data processing apparatus for electronic cashier registers
US4276598A (en) * 1978-12-01 1981-06-30 Omron Tateisi Electronics Co. Electronic cash register including means for producing printed validation data
US4312037A (en) * 1978-12-18 1982-01-19 Casio Computer Co., Ltd. Electronic cash register with single printer for printing receipts and a journal
US4328544A (en) * 1980-01-04 1982-05-04 International Business Machines Corporation Electronic point-of-sale system using direct-access storage
US4425619A (en) * 1980-06-23 1984-01-10 Sharp Kabushiki Kaisha Selective read out of one hour transaction data in an electronic cash register
US4484277A (en) 1980-07-04 1984-11-20 Casio Computer Co., Ltd. Electronic cash register having selective readout
US4485441A (en) * 1980-10-20 1984-11-27 Sharp Kabushiki Kaisha Clerk share calculation in an electronic cash register
US4493038A (en) * 1980-12-24 1985-01-08 Ing. C. Olivetti & C., S.P.A. Data recording machine
US4502120A (en) * 1981-05-29 1985-02-26 Sharp Kabushiki Kaisha System for data transmission between electronic cash registers
US4508962A (en) * 1980-07-30 1985-04-02 Sharp Kabushiki Kaisha Read format preset in an electronic cash register
US4564904A (en) 1979-09-10 1986-01-14 Casio Computer Co., Ltd. Electronic cash register
US4852042A (en) * 1987-02-27 1989-07-25 Ncr Corporation Electronic journal window display
US5214698A (en) * 1991-03-20 1993-05-25 International Business Machines Corporation Method and apparatus for validating entry of cryptographic keys
US5335169A (en) 1992-01-27 1994-08-02 Dsi Of Hawaii, Inc. System for tracking multiple rate assessments on transactions
GB2297414A (en) 1995-01-25 1996-07-31 Ravell Holdings Pte Ltd Point of sale system
US5544086A (en) * 1994-09-30 1996-08-06 Electronic Payment Services, Inc. Information consolidation within a transaction network
WO1996036948A2 (en) 1995-05-10 1996-11-21 Francisco Paul A Point of sale tax reporting and automatic collection system with tax register
US5644724A (en) 1994-09-28 1997-07-01 Cretzler; Donald J. Point-of-sale tax collection system and method of using same
US5774872A (en) 1995-03-31 1998-06-30 Richard Golden Automated taxable transaction reporting/collection system
US5924077A (en) * 1995-12-29 1999-07-13 Sapient Solutions, Llc Computer based system for monitoring and processing data collected at the point of sale of goods and services
US6021201A (en) * 1997-01-07 2000-02-01 Intel Corporation Method and apparatus for integrated ciphering and hashing

Patent Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4144567A (en) 1976-05-26 1979-03-13 Tokyo Electric Co., Ltd. Electronic cash register
US4213179A (en) * 1977-10-08 1980-07-15 Tokyo Electric Co., Ltd. Data processing apparatus for electronic cashier registers
US4186439A (en) * 1977-12-29 1980-01-29 Casio Computer Co., Ltd. Electronic cash register for totalizing sales data on a time zone basis
US4276598A (en) * 1978-12-01 1981-06-30 Omron Tateisi Electronics Co. Electronic cash register including means for producing printed validation data
US4312037A (en) * 1978-12-18 1982-01-19 Casio Computer Co., Ltd. Electronic cash register with single printer for printing receipts and a journal
US4564904A (en) 1979-09-10 1986-01-14 Casio Computer Co., Ltd. Electronic cash register
US4328544A (en) * 1980-01-04 1982-05-04 International Business Machines Corporation Electronic point-of-sale system using direct-access storage
US4425619A (en) * 1980-06-23 1984-01-10 Sharp Kabushiki Kaisha Selective read out of one hour transaction data in an electronic cash register
US4484277A (en) 1980-07-04 1984-11-20 Casio Computer Co., Ltd. Electronic cash register having selective readout
US4508962A (en) * 1980-07-30 1985-04-02 Sharp Kabushiki Kaisha Read format preset in an electronic cash register
US4485441A (en) * 1980-10-20 1984-11-27 Sharp Kabushiki Kaisha Clerk share calculation in an electronic cash register
US4493038A (en) * 1980-12-24 1985-01-08 Ing. C. Olivetti & C., S.P.A. Data recording machine
US4502120A (en) * 1981-05-29 1985-02-26 Sharp Kabushiki Kaisha System for data transmission between electronic cash registers
US4852042A (en) * 1987-02-27 1989-07-25 Ncr Corporation Electronic journal window display
US5214698A (en) * 1991-03-20 1993-05-25 International Business Machines Corporation Method and apparatus for validating entry of cryptographic keys
US5335169A (en) 1992-01-27 1994-08-02 Dsi Of Hawaii, Inc. System for tracking multiple rate assessments on transactions
US5644724A (en) 1994-09-28 1997-07-01 Cretzler; Donald J. Point-of-sale tax collection system and method of using same
US5544086A (en) * 1994-09-30 1996-08-06 Electronic Payment Services, Inc. Information consolidation within a transaction network
GB2297414A (en) 1995-01-25 1996-07-31 Ravell Holdings Pte Ltd Point of sale system
US5774872A (en) 1995-03-31 1998-06-30 Richard Golden Automated taxable transaction reporting/collection system
WO1996036948A2 (en) 1995-05-10 1996-11-21 Francisco Paul A Point of sale tax reporting and automatic collection system with tax register
US5924077A (en) * 1995-12-29 1999-07-13 Sapient Solutions, Llc Computer based system for monitoring and processing data collected at the point of sale of goods and services
US6021201A (en) * 1997-01-07 2000-02-01 Intel Corporation Method and apparatus for integrated ciphering and hashing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Case Study: Signature Pioneer", Chain Store Age Executive, vol. 69, No. 11, Section 2, pp. 5a, Nov. 1993. *
International Search Report PCT/GB 99/03105.

Cited By (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6510986B1 (en) * 1999-05-06 2003-01-28 Fujitsu Limited Transaction record storing device and transaction machine including same
US8635098B2 (en) 2000-02-14 2014-01-21 Ebay, Inc. Determining a community rating for a user using feedback ratings of related users in an electronic environment
US8290809B1 (en) 2000-02-14 2012-10-16 Ebay Inc. Determining a community rating for a user using feedback ratings of related users in an electronic environment
US8612297B2 (en) 2000-02-29 2013-12-17 Ebay Inc. Methods and systems for harvesting comments regarding events on a network-based commerce facility
US7428505B1 (en) * 2000-02-29 2008-09-23 Ebay, Inc. Method and system for harvesting feedback and comments regarding multiple items from users of a network-based transaction facility
US20070233551A1 (en) * 2000-02-29 2007-10-04 Ebay Inc. Method and system for harvesting feedback and comments regarding multiple items from users of a network-based transaction facility
US9614934B2 (en) 2000-02-29 2017-04-04 Paypal, Inc. Methods and systems for harvesting comments regarding users on a network-based facility
US20080320049A1 (en) * 2000-02-29 2008-12-25 Ebay Inc. Methods and systems for harvesting comments regarding events on a network-based commerce facility
US20080077513A1 (en) * 2000-08-08 2008-03-27 Ryan Frederick W Jr Method for collecting sales and/or use taxes on sales that are made via the internet and/or catalog
US7925537B2 (en) 2000-08-08 2011-04-12 Pitney Bowes Inc. Method for collecting sales and/or use taxes on sales that are made via the internet and/or catalog
US9852455B2 (en) 2000-12-19 2017-12-26 Ebay Inc. Method and apparatus for providing predefined feedback
US20020078152A1 (en) * 2000-12-19 2002-06-20 Barry Boone Method and apparatus for providing predefined feedback
US9015585B2 (en) 2000-12-19 2015-04-21 Ebay Inc. Method and apparatus for providing predefined feedback
US9256894B2 (en) 2000-12-19 2016-02-09 Ebay Inc. Method and apparatus for providing predefined feedback
US7773730B1 (en) 2001-08-09 2010-08-10 Voice Signature Llc Voice record integrator
US7398247B2 (en) 2001-08-23 2008-07-08 Pitney Bowes Inc. Secure tax meter and certified service provider center for collecting sales and/or use taxes on sales that are made via the internet and/or catalog
US20030040992A1 (en) * 2001-08-23 2003-02-27 Pitney Bowes Incorporated Secure tax meter and certified service provider center for collecting sales and/or use taxes on sales that are made via the internet and/or catalog
US20030065566A1 (en) * 2001-09-28 2003-04-03 Fujitsu Limited POS terminal and system including the same by which a transaction log can be revised and registered as a new transaction
US7367498B2 (en) * 2001-09-28 2008-05-06 Fujitsu Limited POS terminal and system including the same by which a transaction log can be revised and registered as a new transaction
US20030105963A1 (en) * 2001-12-05 2003-06-05 Slick Royce E. Secure printing with authenticated printer key
US7305556B2 (en) 2001-12-05 2007-12-04 Canon Kabushiki Kaisha Secure printing with authenticated printer key
US7469210B1 (en) 2002-08-08 2008-12-23 Voice Signature Llc Outbound voice signature calls
EP1398741A3 (en) * 2002-09-10 2004-07-28 Wincor Nixdorf International GmbH Secure storage of journal data
EP1398741A2 (en) * 2002-09-10 2004-03-17 Wincor Nixdorf International GmbH Secure storage of journal data
US7987209B2 (en) 2002-12-27 2011-07-26 Honda Motor Co., Ltd. Enhanced trade compliance system: mass amendment
US20060080347A1 (en) * 2002-12-27 2006-04-13 Honda Motor Co., Ltd. Enhanced trade compliance system: mass amendment
US7523320B2 (en) 2003-04-22 2009-04-21 Seiko Epson Corporation Fiscal data recorder with protection circuit and tamper-proof seal
US20040255141A1 (en) * 2003-04-22 2004-12-16 Hodder Leonard B. Fiscal data recorder
US7913097B2 (en) 2003-04-22 2011-03-22 Seiko Epson Corporation Fiscal data recorder programmed to write only non-blank values to memory
US20090182640A1 (en) * 2003-04-22 2009-07-16 Seiko Epson Corporation Fiscal Data Recorder
US20100287064A1 (en) * 2003-11-20 2010-11-11 Ebay Inc Feedback cancellation in a network-based transaction facility
US20050193143A1 (en) * 2003-12-30 2005-09-01 Meyers Brian R. Framework for user interaction with multiple network devices
US7624192B2 (en) 2003-12-30 2009-11-24 Microsoft Corporation Framework for user interaction with multiple network devices
US20060064375A1 (en) * 2004-09-20 2006-03-23 Pitney Bowes Incorporated Method and system for creating and maintaining records of title for items of property
US20060161968A1 (en) * 2004-12-21 2006-07-20 Nintendo Co., Ltd. Method and apparatus for secure delivery and evaluation of prototype software over a network
WO2006083219A1 (en) * 2005-02-02 2006-08-10 Retail Innovation Htt Ab System and method for registration control
US20080281759A1 (en) * 2005-02-02 2008-11-13 Jesper Weissglas System and Method for Registration Control
US8560853B2 (en) * 2005-09-09 2013-10-15 Microsoft Corporation Digital signing policy
US20070061579A1 (en) * 2005-09-09 2007-03-15 Microsoft Corporation Digital signing policy
US8364778B2 (en) 2007-04-11 2013-01-29 The Directv Group, Inc. Method and system for using a website to perform a remote action on a set top box with a secure authorization
US20080256084A1 (en) * 2007-04-11 2008-10-16 The Directv Group, Inc. Method and system for using a website to perform a remote action on a set top box with a secure authorization
US20100174915A1 (en) * 2007-05-30 2010-07-08 Milan Prokin Turnover controller
US9693106B2 (en) 2007-07-26 2017-06-27 The Directv Group, Inc. Method and system for preordering content in a user device associated with a content processing system
US20090031345A1 (en) * 2007-07-26 2009-01-29 The Directv Group. Inc. Method and system for preordering content in a user device associated with a content processing system
US20090031369A1 (en) * 2007-07-26 2009-01-29 The Directv Group, Inc. Method and system for ordering video content from an interactive interface
US20090100065A1 (en) * 2007-10-13 2009-04-16 Jeffs Alistair E Method and system for quickly recording linear content from an interactive interface
US8707361B2 (en) 2007-10-13 2014-04-22 The Directv Group, Inc. Method and system for quickly recording linear content from an interactive interface
US8561114B2 (en) 2007-10-13 2013-10-15 The Directv Group, Inc. Method and system for ordering video content from a mobile device
US8046802B2 (en) 2007-10-13 2011-10-25 The Directv Group, Inc. Method and system for ordering and prioritizing the downloading of content from an interactive interface
US20090100477A1 (en) * 2007-10-13 2009-04-16 Jeffs Alistair E Method and system for ordering video content from a mobile device
US20090099859A1 (en) * 2007-10-13 2009-04-16 Jeffs Alistair E Method and system for ordering and prioritizing the downloading of content from an interactive interface
US8813139B2 (en) * 2007-10-13 2014-08-19 The Directv Group, Inc. Method and system for ordering video content from a first device
US9824389B2 (en) 2007-10-13 2017-11-21 The Directv Group, Inc. Method and system for confirming the download of content at a user device
US20090099912A1 (en) * 2007-10-13 2009-04-16 Jeffs Alistair E Method and system for confirming the download of content at a user device
US8701146B2 (en) * 2007-10-13 2014-04-15 The Directv Group, Inc. Method and system for ordering video content from a mobile device
US20100057583A1 (en) * 2008-08-28 2010-03-04 The Directv Group, Inc. Method and system for ordering video content using a link
US20100057469A1 (en) * 2008-08-28 2010-03-04 The Directv Group, Inc. Method and system for ordering content using a voice menu system
US10827066B2 (en) 2008-08-28 2020-11-03 The Directv Group, Inc. Method and system for ordering content using a voice menu system
US20100071077A1 (en) * 2008-09-12 2010-03-18 International Business Machines Corporation Apparatus, system, and method for detecting tampering of fiscal printers
US9183381B2 (en) 2008-09-12 2015-11-10 International Business Machines Corporation Apparatus, system, and method for detecting tampering of fiscal printers
US20110145658A1 (en) * 2009-12-14 2011-06-16 Seiko Epson Corporation Electronic apparatus and method of controlling electronic apparatus
US8831982B2 (en) * 2010-01-09 2014-09-09 Seiko Epson Corporation Fiscal board receiving case and fiscal printer
US20110169385A1 (en) * 2010-01-09 2011-07-14 Seiko Epson Corporation Fiscal board receiving case and fiscal printer
US20110225059A1 (en) * 2010-03-12 2011-09-15 Mittag Judy L Pos sales transaction safety net
US20130085876A1 (en) * 2010-03-12 2013-04-04 Judy L. Mittag POS Sales Transaction Safety Net
US20110238541A1 (en) * 2010-03-28 2011-09-29 Lenovo (Singapore) Pte. Ltd. Audit trails for electronic financial transactions
US9015078B2 (en) * 2010-03-28 2015-04-21 Lenovo (Singapore) Pte. Ltd. Audit trails for electronic financial transactions
US10667008B1 (en) 2014-12-18 2020-05-26 The Directv Group, Inc. Method and system for setting and receiving user notifications for content available far in the future
US10380656B2 (en) 2015-02-27 2019-08-13 Ebay Inc. Dynamic predefined product reviews
US11132722B2 (en) 2015-02-27 2021-09-28 Ebay Inc. Dynamic predefined product reviews
JP2016181094A (en) * 2015-03-24 2016-10-13 Necソリューションイノベータ株式会社 Information processing device, information processing method, and program
US10282554B2 (en) 2015-04-14 2019-05-07 Manifold Technology, Inc. System and method for providing a cryptographic platform for exchanging information
WO2017155742A1 (en) * 2016-03-08 2017-09-14 Manifold Technology, Inc. Data storage system with blockchain technology
US20200159510A1 (en) * 2018-11-16 2020-05-21 Fujitsu Limited Computer program generation
US10719304B2 (en) * 2018-11-16 2020-07-21 Fujitsu Limited Computer program generation using a library
CN111459753A (en) * 2020-03-26 2020-07-28 平安科技(深圳)有限公司 Point-of-sale terminal data processing method, device, computer equipment and storage medium
CN111459753B (en) * 2020-03-26 2022-09-30 平安科技(深圳)有限公司 Point-of-sale terminal data processing method, device, computer equipment and storage medium
WO2022022126A1 (en) * 2020-07-30 2022-02-03 International Business Machines Corporation Validating tracked portions of received sensor data using computer cryptographic processing
US11323264B2 (en) 2020-07-30 2022-05-03 International Business Machines Corporation Validating tracked portions of received sensor data using computer cryptographic processing
US11496291B2 (en) 2020-07-30 2022-11-08 International Business Machines Corporation Validating received sensor data using computer cryptographic processing
GB2612551A (en) * 2020-07-30 2023-05-03 Ibm Validating tracked portions of received sensor data using computer cryptographic processing
US11645427B2 (en) 2020-11-29 2023-05-09 Bank Of America Corporation Detecting unauthorized activity related to a device by monitoring signals transmitted by the device
US20220391539A1 (en) * 2021-06-06 2022-12-08 International Business Machines Corporation Validating primary subsets of received sensor data using computer cryptographic processing
US11755782B2 (en) * 2021-06-06 2023-09-12 International Business Machines Corporation Validating primary subsets of received sensor data using computer cryptographic processing
CN117176472A (en) * 2023-10-30 2023-12-05 杭州海康威视数字技术股份有限公司 Data tamper-proof method, device and system based on intelligent password security equipment
CN117176472B (en) * 2023-10-30 2024-01-09 杭州海康威视数字技术股份有限公司 Data tamper-proof method, device and system based on intelligent password security equipment

Also Published As

Publication number Publication date
WO2000019387A1 (en) 2000-04-06
ATE255756T1 (en) 2003-12-15
EP1118066B1 (en) 2003-12-03
TW446898B (en) 2001-07-21
EP1118066A1 (en) 2001-07-25
CN1320253A (en) 2001-10-31
PL346943A1 (en) 2002-03-11
DE69913365T2 (en) 2004-12-09
DE69913365D1 (en) 2004-01-15
HUP0103629A3 (en) 2003-05-28
AU6100999A (en) 2000-04-17
HUP0103629A2 (en) 2002-01-28

Similar Documents

Publication Publication Date Title
US6199049B1 (en) Verifiable electronic journal for a point of sale device and methods for using the same
US6889214B1 (en) Virtual security device
EP0032193B1 (en) Communication apparatus
US5715164A (en) System and method for communications with postage meters
US6029150A (en) Payment and transactions in electronic commerce system
US6681214B1 (en) Secure system for printing authenticating digital signatures
US6246967B1 (en) Weight verification device
WO2008147234A2 (en) Turnover controller
US6237098B1 (en) System for protecting weight verification device private key
JPS62229469A (en) Transaction executing system and method
JP3664230B2 (en) Promotion method and system
CN102819809B (en) A kind of acquisition method of tax-control data and system
US20080281759A1 (en) System and Method for Registration Control
US6591251B1 (en) Method, apparatus, and code for maintaining secure postage data
CN1033190C (en) Anti-fake biller, identifier and their anbi-fake, identifying method
RU2302660C1 (en) Fiscal recorder
CN204791328U (en) Tax -control cash register and tax -controlling device, tax accuse collection of money system thereof
RU2207617C1 (en) Method and electronic cryptographic module for information protection and authenticity control
RU2605914C1 (en) Method of processing data on cash calculations and/or calculations with use of payment cards during control-teller machines operation with functions of fixation and transmitting information and fiscal data server operator
CN108389085A (en) Invoice management method, device and system
JP3061710B2 (en) Register system
JP4247012B2 (en) Offline customer information management system
CN106504444A (en) Tax-control cash register device
KR20030066547A (en) System for processing credit card ticket by using electronic signature
KR20020037188A (en) Apparatus and method for receipting and endorsing of electronic receipt

Legal Events

Date Code Title Description
AS Assignment

Owner name: IBM CORPORATION, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CONDE, ALBERTO GUSTAVO GONZALEZ;FORTENBERRY, ROBERT SCOTT;HUCABY, WAYNE ROGER;REEL/FRAME:009503/0528

Effective date: 19980930

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 8

SULP Surcharge for late payment

Year of fee payment: 7

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: TOSHIBA GLOBAL COMMERCE SOLUTIONS HOLDINGS CORPORA

Free format text: PATENT ASSIGNMENT AND RESERVATION;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:028895/0935

Effective date: 20120731